Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Multi-agent Perception via Co-attentive Communication Mechanism

    Multi-agent collaborative perception has the potential to significantly enhance perception performance by facilitating the exchange of complementary information among agents through communication. Effective co...

    Ning Gong, Zhi Li, Shaohui Li, Yuxin Ke in Pattern Recognition and Computer Vision (2024)

  2. No Access

    Chapter and Conference Paper

    Explaining Federated Learning Through Concepts in Image Classification

    Federated learning is a machine learning framework that solves the problem of data silos under secure data protection measures and is gradually becoming a machine learning paradigm for future AI development. I...

    Jiaxin Shen, **aoyi Tao, Liangzhi Li in Algorithms and Architectures for Parallel … (2024)

  3. No Access

    Chapter and Conference Paper

    Test-and-Decode: A Partial Recovery Scheme for Verifiable Coded Computing

    Coded computing has proven its efficiency in tolerating stragglers in distributed computing. Workers return the sub-computation results to the master after computing, and the master recovers the final computat...

    Wei Jiang, ** Wang, Lingzhi Li, Dongyang Yu in Algorithms and Architectures for Parallel … (2024)

  4. No Access

    Chapter and Conference Paper

    Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats Against Face Recognition

    Facial Recognition (FR), despite its remarkable precision and advancements achieved through deep learning, exhibits vulnerability to security threats, specifically originating from deep generative models profi...

    Dezhi Li, Ho** Park, **ngbo Dong, YenLung Lai in Pattern Recognition and Computer Vision (2024)

  5. No Access

    Chapter and Conference Paper

    RecAGT: Shard Testable Codes with Adaptive Group Testing for Malicious Nodes Identification in Sharding Permissioned Blockchain

    Recently, permissioned blockchain has been extensively explored in various fields, such as asset management, supply chain, healthcare, and many others. Many scholars are dedicated to improving its verifiabilit...

    Dongyang Yu, ** Wang, Lingzhi Li, Wei Jiang in Algorithms and Architectures for Parallel … (2024)

  6. No Access

    Chapter and Conference Paper

    Prediction and Analysis of Mobile Phone Export Volume Based on SVR Model

    Electronic products occupy an important position in the export structure of China’s trade, and mobile phone products occupy a place in the export of electronic products. With the change of China’s export trade...

    Ruizhi Li, Haibo Tang in Human-Centered Design, Operation and Evalu… (2024)

  7. No Access

    Chapter and Conference Paper

    Rethinking Feature Context in Learning Image-Guided Depth Completion

    Depth completion (DC) is a classical computer vision task, which aims to estimate the 3D structure of the observed scene by utilizing the sparse depth from the Lidar and the RGB image from the camera. Treating...

    Yikang Ding, Pengzhi Li, Dihe Huang in Artificial Neural Networks and Machine Lea… (2023)

  8. No Access

    Chapter and Conference Paper

    A Full-Level Based Network to Detect Every Aircraft in Airport Scene

    The rapid development of civil aviation has led to increasingly crowded airports. The complex airport environment and large number of aircraft make airport object detection a difficult task. Due to the large e...

    **nzhi Li, **ang Zhang, Juncong Meng, Lanjie Jiang in Image and Graphics (2023)

  9. No Access

    Chapter and Conference Paper

    Multisymplectic Unscented Kalman Filter for Geometrically Exact Beams

    This paper introduces an unscented Kalman filter for the dynamics of geometrically exact beams based on multisymplectic geometry and Hamel’s formalism for classical field theories. The presented approach is a ...

    Tianzhi Li, **zhi Wang in Geometric Science of Information (2023)

  10. No Access

    Chapter and Conference Paper

    Semantic Relation Transfer for Non-overlapped Cross-domain Recommendations

    Although cross-domain recommender systems (CDRSs) are promising approaches to solving the cold-start problem, most CDRSs require overlapped users, which significantly limits their applications. To remove the o...

    Zhi Li, Daichi Amagata, Yihong Zhang in Advances in Knowledge Discovery and Data M… (2023)

  11. No Access

    Chapter and Conference Paper

    5G Wireless Network Digital Twin System Based on High Precision Simulation

    For a long time, the wireless signals of the communication network are invisible and intangible, which brings difficulties in recognizing and maintaining the network

    Zhongqiu **ang, Zhiqing Wang, Kai Fu in Methods and Applications for Modeling and … (2022)

  12. No Access

    Chapter and Conference Paper

    Evaluating the Parallel Execution Schemes of Smart Contract Transactions in Different Blockchains: An Empirical Study

    In order to increase throughput, more and more blockchains begin to provide the ability to execute smart contract transactions in parallel. However, there is currently no research work on evaluating parallel e...

    Jianfeng Shi, Chengzhi Li, Heng Wu in Algorithms and Architectures for Parallel … (2022)

  13. No Access

    Chapter and Conference Paper

    Nested Named Entity Recognition from Medical Texts: An Adaptive Shared Network Architecture with Attentive CRF

    Recognizing useful named entities plays a vital role in medical information processing, which helps drive the development of medical area research. Deep learning methods have achieved good results in medical n...

    Junzhe Jiang, Mingyue Cheng, Qi Liu, Zhi Li, Enhong Chen in Artificial Intelligence (2022)

  14. No Access

    Chapter and Conference Paper

    Information Utilization Ratio in Heuristic Optimization Algorithms

    Heuristic algorithms are able to optimize objective functions efficiently because they use intelligently the information about the objective functions. Thus, information utilization is critical to the performa...

    Junzhi Li, Ying Tan in Advances in Swarm Intelligence (2022)

  15. No Access

    Chapter and Conference Paper

    An Improved Particle Swarm Optimization with Dual Update Strategies Collaboration Based Task Allocation

    The task allocation problem is a hot topic in the field of multiple unmanned aerial vehicle (UAV). In this paper, we consider the task allocation in rescue scenarios and establish the optimization model. Then,...

    Shuang **a, **angyin Zhang, **uzhi Li, Tian Zhang in Advances in Swarm Intelligence (2021)

  16. No Access

    Chapter and Conference Paper

    Design of Mixed Learning System of Tourism Planning Course Based on Mobile Terminal

    There are defects in the processing and allocation of teaching resources in the current learning system, which leads to the phenomenon that the teaching information display is stuck and collapsed when the numb...

    Yu-xiang Liu, Zhi-li Sha in e-Learning, e-Education, and Online Training (2021)

  17. No Access

    Chapter and Conference Paper

    Design of Spoken English Distance Teaching Training System Based on Virtual Reality Technology

    At present, the spoken English long-distance teaching training system has not designed a dynamic dictionary for spoken English teaching training, which leads to a high occupancy rate of the system server hardw...

    Zhi-li Sha, Yu-xiang Liu in e-Learning, e-Education, and Online Training (2021)

  18. No Access

    Chapter and Conference Paper

    Optimizing Frequency Reuse in Multibeam Satellite Communication Systems

    Frequency reuse (FR) is one of the most effective approaches for mitigating co-channel interference and improving the capacity of communication systems. However, there are some difficulties in applying it in m...

    Weizhong Zhang, Wenchao Yang, Zhenyong Wang in Communications, Signal Processing, and Sys… (2021)

  19. No Access

    Chapter and Conference Paper

    Joint Source-Channel Coding Scheme Based on UEP-Raptor

    Raptor code is a solution used for forward error correction at the application layer during multimedia transmission. The amount of multimedia transmission data is huge. In order to transmit high-quality image ...

    Chang Liu, Wenchao Yang, Dezhi Li in Communications, Signal Processing, and Sys… (2021)

  20. No Access

    Chapter and Conference Paper

    Learning the Implicit Semantic Representation on Graph-Structured Data

    Existing representation learning methods in graph convolutional networks are mainly designed by describing the neighborhood of each node as a perceptual whole, while the implicit semantic associations behind h...

    Likang Wu, Zhi Li, Hongke Zhao, Qi Liu in Database Systems for Advanced Applications (2021)

previous disabled Page of 2